Cryptographic Coprocessor for Data Integrity Algorithms

被引:0
|
作者
Svasta, Paul [1 ]
Marghescu, Andrei [1 ]
Neacsa, Traian [1 ]
机构
[1] Univ Politehn Bucuresti, CETTI, Bucharest, Romania
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In cryptography, for message/data integrity assurances, that are vital for a security product, are used Hash functions. The Hash algorithm is based on a one-way-function that maps an arbitrary-length data to a fixed-length output. This paper will present the usage of the newest hash algorithm SHA-3 - Keccak into an electronic module based on FPGA. This will work, along with an ARM Cortex-A9 microprocessor, as a cryptographic coprocessor. The implemented hardware solution significantly increased the computational speed of the signal data processing.
引用
收藏
页码:91 / 94
页数:4
相关论文
共 50 条
  • [1] CoARX: A Coprocessor for ARX-based Cryptographic Algorithms
    Shahzad, Khawar
    Khalid, Ayesha
    Rakossy, Zolton Endre
    Paul, Goutam
    Chattopadhyay, Anupam
    2013 50TH ACM / EDAC / IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2013,
  • [2] The IBM 4769 Cryptographic Coprocessor
    Busby, J. A.
    Cohen, E. N.
    Dames, E. A.
    Doherty, J.
    Dragone, S.
    Evans, D.
    Fisher, M. J.
    Hadzic, N.
    Hagleitner, C.
    Higby, A. J.
    Hocker, M. D.
    Jagich, L. S.
    Jordan, M. J.
    Kisley, R.
    Lamb, K. D.
    Marik, M. D.
    Mayfield, J.
    Morris, T. E., Jr.
    Needham, T. D.
    Santiago-Fernandez, W.
    Urban, V
    Visegrady, T.
    Werner, K.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2020, 64 (5-6) : 5 - 6
  • [3] IBM 4765 cryptographic coprocessor
    Arnold, T. W.
    Buscaglia, C.
    Chan, F.
    Condorelli, V.
    Dayka, J.
    Santiago-Fernandez, W.
    Hadzic, N.
    Hocker, M. D.
    Jordan, M.
    Morris, T. E., Jr.
    Werner, K.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2012, 56 (1-2) : 1 - 2
  • [4] VLSI Design of Reconfigurable Cipher Coprocessor Supporting both Symmetric and Asymmetric Cryptographic Algorithms
    Tian, Chaoxuan
    Zhu, Jialiang
    Shan, Weiwei
    Fu, Xingyuan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 299 - 307
  • [5] An open-source cryptographic coprocessor
    Gutmann, P
    USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 97 - 111
  • [6] CryptoBooster: A reconfigurable and modular cryptographic coprocessor
    Mosanya, E
    Teuscher, C
    Restrepo, HF
    Galley, P
    Sanchez, E
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, 1999, 1717 : 246 - 256
  • [7] A unified architecture for a public key cryptographic coprocessor
    Wang, Yi
    Maskell, Douglas L.
    Leiwo, Jussipekka
    JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (10) : 1004 - 1016
  • [8] Cryptographic Coprocessor Design for IoT Sensor Nodes
    Wang, Weizhen
    Han, Jun
    Xie, Zhicheng
    Huang, Shan
    Zeng, Xiaoyang
    2016 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2016, : 37 - 38
  • [9] A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms
    Shan, Weiwei
    Shi, Longxing
    Fu, Xingyuan
    Zhang, Xiao
    Tian, Chaoxuan
    Xu, Zhipeng
    Yang, Jun
    Li, Jie
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [10] A EUROPEAN CALL FOR CRYPTOGRAPHIC ALGORITHMS - RIPE - RACE INTEGRITY PRIMITIVES EVALUATION
    VANDEWALLE, J
    CHAUM, D
    FUMY, W
    JANSEN, C
    LANDROCK, P
    ROELOFSEN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 267 - 271